Network-Wide Configuration Synthesis
نویسندگان
چکیده
Computer networks are hard to manage. Given a set of highlevel requirements (e.g., reachability, security), operators have to manually figure out the individual configuration of potentially hundreds of devices running complex distributed protocols so that they, collectively, compute a compatible forwarding state. Not surprisingly, operators often make mistakes which lead to downtimes. To address this problem, we present a novel synthesis approach that automatically computes correct network configurations that comply with the operator’s requirements. We capture the behavior of existing routers along with the distributed protocols they run in stratified Datalog. Our key insight is to reduce the problem of finding correct input configurations to the task of synthesizing inputs for a stratified Datalog program. To solve this synthesis task, we introduce a new algorithm that synthesizes inputs for stratified Datalog programs. This algorithm is applicable beyond the domain of networks. We leverage our synthesis algorithm to construct the first network-wide configuration synthesis system, called SyNET, that support multiple interacting routing protocols (OSPF and BGP) and static routes. We show that our system is practical and can infer correct input configurations, in a reasonable amount time, for networks of realistic size (> 50 routers) that forward packets for multiple traffic classes.
منابع مشابه
Policy Model for Sharing Network Slices in 5G Core Network
As mobile data traffic increases, and the number of services provided by the mobile network increases, service load flows as well, which requires changing in the principles, models, and strategies for media transmission streams serving to guarantee the given nature of giving a wide scope of services in Flexible and cost-effective. Right now, the fundamental question remains what number of netwo...
متن کاملNetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion
Network operators often need to adapt the configuration of a network in order to comply with changing routing policies. Evolving existing configurations, however, is a complex task as local changes can have unforeseen global effects. Not surprisingly, this often leads to mistakes that result in network downtimes. We present NetComplete, a system that assists operators in modifying existing netw...
متن کاملAsymmetric Synthesis of New Diastereomerically Pure Spiro Oxindolopyrrolizidines and Oxindolopyrrolidines via Cycloaddition Reactions of Azomethine Ylides and Menthol-Drived Trans-Cinnamic
Chiral pyrrolidines and pyrrolizidines with spirooxindole ring systems are the central skeletons for numerous alkaloids and pharmacologically important compounds. Gelesmine, pseudotabersonine, formosanine, isoformosanine, morroniside and mitraphylline are some of the alkaloids containing spirooxindole ring systems. Derivatives of spirooxindole find very wide biological applications as anti micr...
متن کاملAsymmetric Synthesis of New Diastereomerically Pure Spiro Oxindolopyrrolizidines and Oxindolopyrrolidines via Cycloaddition Reactions of Azomethine Ylides and Menthol-Drived Trans-Cinnamic
Chiral pyrrolidines and pyrrolizidines with spirooxindole ring systems are the central skeletons for numerous alkaloids and pharmacologically important compounds. Gelesmine, pseudotabersonine, formosanine, isoformosanine, morroniside and mitraphylline are some of the alkaloids containing spirooxindole ring systems. Derivatives of spirooxindole find very wide biological applications as anti micr...
متن کاملAn Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017